You are here:

June 2017

Key decision makers do not have confidence in their Boards’ ability to manage cyber security threats, according to the latest cyber security analysis from Control Risks. The global ‘Cyber Security Landscape’ survey of IT and Business decision makers found that almost half of respondents reported they believe their organisation’s board-level executives do not take cyber […]

Mobile and IoT-connected devices present special security risks that many companies are still figuring out how to mitigate. ZDNet’s sister site, Tech Pro Research, recently polled IT professionals about the state of cybersecurity in their workplaces. Most seemed to feel that cyberthreats were relatively well controlled. The majority of respondents said their company’s cybersecurity readiness […]

In some cases, states are already forging ahead on the international stage. The National Guard State Partnership Program, for example, matches a state’s National Guard with a partner nation’s security forces to participate, cooperate, and train on topics including emergency management and disaster response, border and port security, counterterrorism, and as of a few years […]

China to implement cyber security law from Thursday China, battling increased threats from cyber-terrorism and hacking, will adopt from Thursday a controversial law that mandates strict data surveillance and storage for firms working in the country, the official Xinhua news agency said. May 30 2017 … read more at: http://www.reuters.com/cyberrisk

The world is heading towards a “permanent war” in cyberspace, the head of France’s digital security agency has warned. Guillaume Poupard, director general of the National Cybersecurity Agency of France (ANSSI) said intensifying attacks were coming from unspecified states, as well as criminal and extremist groups. “We must work collectively, not just with two or […]

When it comes to improving cyberincident response, security teams can learn a valuable lesson from the military about the importance of standard operating procedures. “SOPs” document prescribed methods for carrying out an activity or responding to a difficult situation. The U.S. Army has SOPs for seemingly everything, and for good reason. Many SOPs help soldiers […]

Key decision makers do not have confidence in their Boards’ ability to manage cyber security threats, according to the latest cyber security analysis from Control Risks. The global ‘Cyber Security Landscape’ survey of IT and Business decision makers found that almost half of respondents reported they believe their organisation’s board-level executives do not take cyber […]